EP0043027A1 - Verfahren und Anlage zum Prüfen der Echtheit einer elektronischen Unterschrift - Google Patents
Verfahren und Anlage zum Prüfen der Echtheit einer elektronischen Unterschrift Download PDFInfo
- Publication number
- EP0043027A1 EP0043027A1 EP81104628A EP81104628A EP0043027A1 EP 0043027 A1 EP0043027 A1 EP 0043027A1 EP 81104628 A EP81104628 A EP 81104628A EP 81104628 A EP81104628 A EP 81104628A EP 0043027 A1 EP0043027 A1 EP 0043027A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- message
- user
- vault
- key
- segment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- interference can, aside from wiretapping, take two forms: attempts to disrupt communications to prevent reception of intelligence, and attempts to corrupt, or to deceive legitimate operations into accepting false or obsolete information.
- a still further threat is "Disruption.”
- the foe no longer cares to remain in hiding, but actively disrupts communication by any (electronic) means available to him, including brute force signals.
- the topic of countermeasures to Communications Disruption is enormous in scope and known to the military as “Anti-Jamming.” It is of lesser importance in non-military traffic, where one usually has the time to look for the intruder once his activity is known. Of interest here is merely the fact that cryptography has also an important role in Anti-Jamming.
- the Vault now has the clear text BL1 and can hence check BC received against his local time BC. If both match within the agreed tolerances (determined by transmission distances and switching operations, etc.). The Vault will know the communication Cl must have originated from a legitimate source A. Station A has now been authenticated. The degree of authenticity of the data is simply determined by the dimension of digit block BC. Each digit in BC contributes one bit of authentication information. It is not possible to authenticate more efficiently.
- the Vault now reads the address of the intended receiver B contained in S/R, and establishes key K in the same manner as it did K A . It then composes a new block BL2 consisting of S/R the - data D, and a new time count BC representing the current time at the Vault. This block BL2 is enciphered using key K B . The resulting cipher C2 is transmitted to B.
- the present system uses a step coding technique which is very similar to data chaining.
- a data chaining system reference is made to U.S. Patent No. 4,078,152 of L. B. Tuckerman, entitled “Block-Cipher Cryptographic System with Chaining.”
- the decisive step here is that B will receive two pieces of information: Cipher C2 which he can read since the Vault enciphered it in his key K B" and cipher Cl which the Vault guarantees as being the authenticated original from A. B now has a copy of Cl, which can, in case of a disagreement, be deciphered in front of a legal arbiter. A cannot change his mind after he transmits Cl since the Vault can automatically certify emanation of Cl from A.
- the next step then is to encipher blocks C and G, resulting in block H.
- the cipher is then defined as We also note that in FIG. 8 where the notation denotes the encipherment or encryption of data D with key K using Crpto System ⁇ , and where the notation denotes the step encryption or encipherment of data D with Key K making use of the ⁇ Crypto System, Hy ⁇ -1 or ⁇ -1 we denote the decryption or deciphering process.
- Vault The facility called the "Vault” plays a decisive role in the present system and its function will now be described.
- the key list would then contain the names of all members along with the special encipherment of the key assigned to them.
- Member A desiring to communicate with member B would transmit Cl (as explained before) along with his name A in the clear to the Vault.
- the system now separates the two components of the vector S/R and establishes S as being A and R as being B.
- the name B is now routed back to the DES (block 22, FIG. 2) or ⁇ encrypter where B and K * are used to generate K B .
- Step-Coder which includes the DES. It will be noted in FIG. 2 that although the DES box is shown inside the Step-Coder, it is nevertheless available to the system to perform ordinary encipherment/decipher- ment functions.
- Step enciphered message ST1 has now been formed and is conveyed to B.
- Vault has just been generally described with respect to the operations therein as a result of the first sequence of communication, i.e., A to V and then V to B.
- the operation in the reverse direction would be substantially the same, i.e., B to V with C2 and V to A with ST2.
- FIG. 1.2 is a combination functional block diagram and system data flow chart.
- FIG. 1.2 it should first be noted that the figure is partitioned vertically by dotted lines to designate Station A, Vault and Station B. It should also be noted that the upper level of data flow in the figure refers to the first sequence of operations, i.e., from A to the Vault and then from the Vault to B. The lower data flow path in the drawings refers to the second sequence of operations namely from B to the Vault and from the Vault to A.
- the blocks designate the hardware resources necessary for the description of the protocol.
- Station A includes three blocks designated A/B, Data and BC. These refer to the particular message segments stored in appropriate registers in the station.
- Station A contains a box marked T r on the upper level of the drawings and E -1 (step-code) on the lower level.
- the key K A is shown entering this block from the bottom.
- the ⁇ relates to the simple block-cipher encryption function under the designated key
- the ⁇ -1 relates to the step-decoding function necessary to decode the messages ST1 and ST2 received from the Vault.
- the same comments apply to the ⁇ and E 1 blocks under Station B also.
- the message designated BL3 contains D ⁇ BC2 ⁇ C1 ⁇ A/B.
- the bracketed portions have a specific designation under them, i.e., Cl, STl, C2 and ST2, this refers to an encrypted message actually appearing on the communication lines of the system.
- the particular key under which a particular message is encrypted appears at the bottom right hand corner of the bracket, i.e. K for message Cl.
- ST2 will now contain a certified copy of C2 and Cl, the entire step-code ST2 being enciphered with K A .
- ST2 ⁇ (K A , BL6)
- the cipher ⁇ (K A , K A ) and ⁇ (K B , K B ) are first presented to the Arbiter by A and B which are deciphered to establish the keys owned by A and B. Then Cl and C2 are deciphered using K A and KB, furnishing the required legal proof with the degree of reliability specified by the dimensions of the vectors BC.
- FIGS. 2 through 5 is basically a microprocessor controlled unit of a conventional design wherein all required subroutines are appropriately stored in the control ' memory of the microprocessor whose routines are_. accessed by predetermined signals appearing on the input line to the system or, when appropriate, by system initialization operations.
- FIGS. 6A through 6E functionally describes the significant operations occurring within the three system entities at any particular point in time when an electronic signature verification operation is called for. These entities are Station A the "sender", the Vault,and Station B, the "receiver”. Referring to FIGS. 6A through 6E, and specifically to the User A and User B flow charts respectively, it will be observed that both the "sender” and “receiver" functions must be included in each terminal. Whether a particular terminal unit is functioning as a User A or User B, will determine which of the specified functions that particular user's terminal will perform. This determination is made in blocks 1 and 2 of the User A and User B flow charts respectively.
- FIG. 1 comprises the general architecture of an N to N communication network suitable for carrying out the principles of the present invention.
- the existence of a Data Communication Network and plurality of communicating Terminals is well known in the art.
- the Vault is available to the network over the Main Bus which is obviously also available to each Terminal in the system.
- the functional details of the Vault are set forth in FIG. 2 and similarly the functional details of a suitable microprocessor controlled terminal are set forth in FIG. 3.
- FIG. 4 illustrates the functional details of the Vault Control Unit shown in FIG__2
- FIG. 5 shows the details of the Step-Coder Unit as shown in FIG. 2.
- the terminal for practicing the present invention.
- the first is a Timer (BC) which would be accessed to produce the counter values BC2, etc. mentioned in the previous description of the present transaction verification system.
- the second is the Step-Decoder Unit shown in the Terminal. It is substantially identical to the Step-Coder Unit in the Vault and each includes a standard key-controlled block-cipher encryption device (DES block).
- DES block block-controlled block-cipher encryption device
- register Rl and R2 in the figure are utilized to store K * and the generated user keys K X respectively. It is noted that only register R2 which stores the current working key is utilized during the various encryption and decryption operations required of the system. Further, register R3 and the multiplexor are utilized for providinq the required data chaining function as necessitated by the step-coding (decoding) operations. The specific way in which these two units are utilized is set forth clearly in the description of blocks 10 and 15 in the flow charts and timing sequences charts.
- a "no" evaluation of block 1 initiates block 2 which tests the system bus for a 'received message?' condition and if the answer to this is likewise 'no' the Terminal returns to the 'wait' state and continues recirculating through blocks 1 and 2 until either a 'send message' signal is detected or a 'receive message' signal is detected.
- the Terminal controls cause the message DL1 to be formed from the data previously entered by User A into the Terminal.
- the data content of message BLl is shown clearly in block 3.
- the system then proceeds to block 4 which causes the Terminal DES unit to form cipher message Cl which is informed by encrypting the message BL1 under the key K A as shown in block 4.
- the authenticity of CY is checked. This is done by comparing the BC field included in message Cl with the BC field in the local counter within the Vault. It will be noted that any irregularity in the message will cause this check to fail. This 'would include failure of account value, an error in the transmission which might effect several bits in the cipher Cl being conveyed to the Vault or an incorrect address or name supplied to the Vault in clear for purposes of forming the key K A . If the authenticity test should fail, the system would go to block 19, whereupon User A would be requested to resend his message.
- the system proceeds to block 7 wherein the A/B field of the message is interpreted and it is determined, in this case, that User A is the sender. This now tells the Vault that the person sending the just received cipher is User A, the sender rather than User B, the receiver. At this point the system proceeds to block 8 and in this block the Vault forms the message block BL3 with the data indicated in block 8 on FIG. 6C and proceeds to block 9 at which point User B's address or name as received from User A, is utilized by the Vault to generate the key K B . This is then stored in register R2. At this point the system proceeds to block 10.
- a step encipherment of the message block BL3 is prepared utilizing the data chaining concept described previously and set forth in more detail in the timing sequence chart for step 10.
- the output of this block is the step-cipher ST1.
- step-cipher ST1 is sent to User B and the system returns to block 1 where it returns to a 'wait' state for the next message to be received from other users on the system.
- User B detects his address sent in 'clear' on the Main Bus together with step-cipher ST1.
- Block 1 of the User B flow chart determines that a message is being received rather than sent and causes the system to proceed to block 2. Since this is a 'received message' situation the User B Terminal proceeds to block 3 which causes the message ST1 to be placed in User B's memory.
- the system then proceeds to block 11 wherein the message block BL5 is enciphered (normally) to form the message C2.
- This message is sent to the Vault in block 12 together with B's name or address in clear.
- User B's Terminal controls return his system to block 1 and the electronic signature verification operation is terminated insofar as User B's active participation is concerned.
- block 3 the message C2 received from B is classified. Since the message C2 is a cipher the system proceeds to block 4. Had it not been a cipher it is assumed by the present embodiment that it would have been a 'resend request' from either User A or User B. This would be determined by reading the clear address of the particular user sending the message from the message header and a copy of the last step-cipher saved in block 11 or 16 would be retransmitted to the requesting user.
- the key K B is generated using B's name which was transmitted along with his message C2 and this key is stored in register R2 within the Vault Step-Coder Unit.
- block 14 the sender's identity'or name A is accessed and A's key K A is generated.
- the system then proceeds to block 15 wherein the step-cipher S T2 is generated from the message block BL6 formed in block 13 and A's key K A .
- step 16 a copy of the step-cipher ST2 is saved and in block 17 this step-cipher is sent to User A.
- step 17 this step-cipher is sent to User A.
- the Vault's direct involvement in the transaction is terminated and returns to the 'wait' state as defined in block 1 of his flow chart on FIG. 6B.
- message ST2 is on the system bus which causes the system to proceed to block 10, which initiates a step-decipher operation within User A's Step-Decoder Unit.
- message block BL7 which, if everything is proper, should be the same as message block BL6 formed within the Vault in block 13. This validity is checked in block 11 of User A's Terminal. As in- all previous instances this authenticity is checked by comparing the count value BC within the just decoded message block BL7 with the count value BC currently within User A Terminal's Timer.
- step 12 If it is found that the count values are not equal within acceptable limits, the system would proceed to block 12 which would cause a 'resend request' to be sent to the Vault wherein step-cipher ST2 would be retransmitted, and User A's Terminal sequence would go back to block 7.
- block 14 within User A's Terminal completes the electronic signature verification operation of the present system assuming that no errors were detected in block 13.
- the system would proceed to block 19 wherein the Vault mana g ment would be notified by some prearranged method external to the present system of a fault condition within the Vault.
- the Vault mana g ment would be notified by some prearranged method external to the present system of a fault condition within the Vault.
- User B would be notified by User A that errors have been detected which are caused in the Vault.
- the Cl match fails as required of the test in block 13 of User A's Terminal it is presumed that there is either a transient or permanent error somewhere in the transmission system or within the Vault. In the first of these tests, where the errors are different, it may be generally presumed that the error is transient somewhere between User A and User B, the assumption being that retransmission will ultimately result in the same message beinq sent. If, however, the transient errors continue, the system must be notified that the problem exists and-must be corrected.
- the uses of the herein disclosed electronic signature verification and message authentication system in the modern day business environment could be manifold.
- the system assures virtually a foolproof method of guaranteeing both the identity of the sender and the content of a message insofar as a receiver is concerned, while at the same time guaranteeing the integrity or data content of the received message to the original sender.
- This allows the utilization of long distance telecommunications facilities for the real time completion of transactions which could only be performed in the past utilizing much more time consuming and conventional methods, such as electronic mail (i.e., facsimile) or by actually having people meet to consummate various transactions.
- legally binding contracts could be effected by having both parties to the contract send an additional data or message portion to the other, each having his own unique signature appended thereto, plus each party to the transaction would have his own resident copy of the contract, electronically signed by the other party and wherein the actual wording of the contract - would be verifiable at any time in the future, if, for example, a conflict arose and allegations were made that the wordings were at variance.
- the system could also have applicability for such a commercial purpose as telephone ordering (i.e., local terminal) by an individual from a large, centrally located store, wherein both ordering and funds transfer could be handled in a highly reliable manner utilizing various aspects of the presently disclosed system.
- telephone ordering i.e., local terminal
- both ordering and funds transfer could be handled in a highly reliable manner utilizing various aspects of the presently disclosed system.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US06/165,455 US4326098A (en) | 1980-07-02 | 1980-07-02 | High security system for electronic signature verification |
US165455 | 1980-07-02 |
Publications (2)
Publication Number | Publication Date |
---|---|
EP0043027A1 true EP0043027A1 (de) | 1982-01-06 |
EP0043027B1 EP0043027B1 (de) | 1984-09-26 |
Family
ID=22598963
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP81104628A Expired EP0043027B1 (de) | 1980-07-02 | 1981-06-16 | Verfahren und Anlage zum Prüfen der Echtheit einer elektronischen Unterschrift |
Country Status (4)
Country | Link |
---|---|
US (1) | US4326098A (de) |
EP (1) | EP0043027B1 (de) |
JP (1) | JPS5745756A (de) |
DE (1) | DE3166298D1 (de) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3229593A1 (de) * | 1982-08-09 | 1984-02-09 | Telefonbau Und Normalzeit Gmbh, 6000 Frankfurt | Verfahren und schaltungsanordnung zur autorisierten uebermittlung von nachrichten |
US4890323A (en) * | 1986-05-22 | 1989-12-26 | Racal-Guardata Limited | Data communication systems and methods |
EP0389895A1 (de) * | 1989-03-16 | 1990-10-03 | Yeda Research And Development Company Limited | Verfahren und Apparat für Benützeridentifikation, beruhend auf permutierten Kernen |
GB2260467A (en) * | 1991-09-12 | 1993-04-14 | Blick Communications Ltd | Repeater |
US6356941B1 (en) * | 1999-02-22 | 2002-03-12 | Cyber-Ark Software Ltd. | Network vaults |
Families Citing this family (110)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2480539B1 (fr) * | 1980-04-09 | 1985-09-13 | Cii Honeywell Bull | Procede et systeme de transmission de messages signes |
US5007083A (en) * | 1981-03-17 | 1991-04-09 | Constant James N | Secure computer |
SE426128B (sv) * | 1981-04-08 | 1982-12-06 | Philips Svenska Ab | Metod vid overforing av datameddelanden mellan tva stationer, samt overforingsanleggning for utforande av metoden |
FR2514593B1 (fr) * | 1981-10-09 | 1986-12-26 | Bull Sa | Procede et dispositif pour authentifier la signature d'un message signe |
US4458109A (en) * | 1982-02-05 | 1984-07-03 | Siemens Corporation | Method and apparatus providing registered mail features in an electronic communication system |
US4757468A (en) * | 1982-09-22 | 1988-07-12 | Intel Corporation | Authenticated read-only memory |
US4723284A (en) * | 1983-02-14 | 1988-02-02 | Prime Computer, Inc. | Authentication system |
US4588991A (en) * | 1983-03-07 | 1986-05-13 | Atalla Corporation | File access security method and means |
AT385145B (de) * | 1983-07-13 | 1988-02-25 | Schrack Elektronik Ag | Sicherungseinrichtung fuer ein in einem gehaeuse angeordnetes arbeitsgeraet bzw. schaltungsanordnung |
CA1235224A (en) * | 1983-08-19 | 1988-04-12 | Eiji Okamoto | Device for calculating a charge for a charged information signal with errors avoided in a report of the charge |
US4652990A (en) * | 1983-10-27 | 1987-03-24 | Remote Systems, Inc. | Protected software access control apparatus and method |
US5168520A (en) * | 1984-11-30 | 1992-12-01 | Security Dynamics Technologies, Inc. | Method and apparatus for personal identification |
US4885778A (en) * | 1984-11-30 | 1989-12-05 | Weiss Kenneth P | Method and apparatus for synchronizing generation of separate, free running, time dependent equipment |
US4998279A (en) * | 1984-11-30 | 1991-03-05 | Weiss Kenneth P | Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics |
US5367572A (en) * | 1984-11-30 | 1994-11-22 | Weiss Kenneth P | Method and apparatus for personal identification |
US4800590A (en) * | 1985-01-14 | 1989-01-24 | Willis E. Higgins | Computer key and computer lock system |
US5136648A (en) * | 1985-02-19 | 1992-08-04 | Octel Communications Corporation | Message storage security system |
US4888798A (en) * | 1985-04-19 | 1989-12-19 | Oms, Inc. | Modular software security |
US4677670A (en) * | 1985-07-01 | 1987-06-30 | Henderson Jr Paul B | Paired-secure message identification controller for computers and the like |
US4891838A (en) * | 1985-11-04 | 1990-01-02 | Dental Data Service, Inc. | Computer accessing system |
JPS62236234A (ja) * | 1986-04-08 | 1987-10-16 | Nec Corp | 同報無線システム |
US4850018A (en) * | 1986-07-01 | 1989-07-18 | Baker Industries, Inc. | Security system with enhanced protection against compromising |
US4916738A (en) * | 1986-11-05 | 1990-04-10 | International Business Machines Corp. | Remote access terminal security |
US6785021B1 (en) | 1988-09-22 | 2004-08-31 | Audiofax, Ip, Llc | Facsimile telecommunications system and method |
US5459584A (en) | 1988-09-22 | 1995-10-17 | Audiofax, Inc. | Facsimile telecommunications system and method |
US4994926C1 (en) * | 1988-09-22 | 2001-07-03 | Audiofax Ip L L C | Facsimile telecommunications system and method |
US7365884B2 (en) * | 1988-09-22 | 2008-04-29 | Catch Curve, Inc. | Facsimile telecommunications system and method |
US5058163A (en) * | 1988-10-12 | 1991-10-15 | Pacific Bell | Interface unit for transferring digital data between time-domain multiplexed communication links |
US5016274A (en) * | 1988-11-08 | 1991-05-14 | Silvio Micali | On-line/off-line digital signing |
US4965568A (en) * | 1989-03-01 | 1990-10-23 | Atalla Martin M | Multilevel security apparatus and method with personal key |
US6175312B1 (en) | 1990-05-29 | 2001-01-16 | Microchip Technology Incorporated | Encoder and decoder microchips and remote control devices for secure unidirectional communication |
US5113444A (en) * | 1990-09-05 | 1992-05-12 | Arnold Vobach | Random choice cipher system and method |
EP0484603B1 (de) * | 1990-11-09 | 1995-09-13 | International Business Machines Corporation | Nichtablehnung in Rechnernetzwerken |
US7525691B2 (en) * | 1991-02-12 | 2009-04-28 | Catch Curve, Inc. | Facsimile telecommunications system and method |
US5237614A (en) * | 1991-06-07 | 1993-08-17 | Security Dynamics Technologies, Inc. | Integrated network security system |
EP0520709A3 (en) * | 1991-06-28 | 1994-08-24 | Digital Equipment Corp | A method for providing a security facility for remote systems management |
US5200999A (en) * | 1991-09-27 | 1993-04-06 | International Business Machines Corporation | Public key cryptosystem key management based on control vectors |
US5164988A (en) * | 1991-10-31 | 1992-11-17 | International Business Machines Corporation | Method to establish and enforce a network cryptographic security policy in a public key cryptosystem |
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US5307412A (en) * | 1992-09-30 | 1994-04-26 | Vobach Arnold R | Random coding cipher system and method |
US5335280A (en) * | 1993-01-28 | 1994-08-02 | Vobach Arnold R | Random sum cipher system and method |
JP3218776B2 (ja) * | 1993-03-03 | 2001-10-15 | 松下電器産業株式会社 | 電子レジスタ |
CA2179302A1 (en) * | 1993-12-17 | 1995-06-22 | Mohamed Ali Moussa | Method of automated signature verification |
US5420927B1 (en) * | 1994-02-01 | 1997-02-04 | Silvio Micali | Method for certifying public keys in a digital signature scheme |
US5559888A (en) * | 1994-02-15 | 1996-09-24 | Lucent Technologies Inc. | Secure information retrieval service (SIRS) |
US5544322A (en) * | 1994-05-09 | 1996-08-06 | International Business Machines Corporation | System and method for policy-based inter-realm authentication within a distributed processing system |
US5826241A (en) | 1994-09-16 | 1998-10-20 | First Virtual Holdings Incorporated | Computerized system for making payments and authenticating transactions over the internet |
US7492905B2 (en) | 1995-05-17 | 2009-02-17 | The Chamberlain Group, Inc. | Rolling code security system |
US6980655B2 (en) | 2000-01-21 | 2005-12-27 | The Chamberlain Group, Inc. | Rolling code security system |
US6690796B1 (en) * | 1995-05-17 | 2004-02-10 | The Chamberlain Group, Inc. | Rolling code security system |
CA2193846C (en) | 1995-05-17 | 2004-02-17 | Bradford L. Farris | Rolling code security system |
US5881142A (en) * | 1995-07-18 | 1999-03-09 | Jetstream Communications, Inc. | Integrated communications control device for a small office configured for coupling within a scalable network |
EP0760565B1 (de) * | 1995-08-28 | 1998-07-08 | Ofra Feldbau | Einrichtung und Verfahren zur Authentifizierung der Absendung und des Inhalts eines Dokuments |
US6097811A (en) * | 1995-11-02 | 2000-08-01 | Micali; Silvio | Tree-based certificate revocation system |
US7822989B2 (en) * | 1995-10-02 | 2010-10-26 | Corestreet, Ltd. | Controlling access to an area |
US5666416A (en) * | 1995-10-24 | 1997-09-09 | Micali; Silvio | Certificate revocation system |
US6766450B2 (en) * | 1995-10-24 | 2004-07-20 | Corestreet, Ltd. | Certificate revocation system |
US5717757A (en) * | 1996-08-29 | 1998-02-10 | Micali; Silvio | Certificate issue lists |
US7716486B2 (en) | 1995-10-02 | 2010-05-11 | Corestreet, Ltd. | Controlling group access to doors |
US7337315B2 (en) | 1995-10-02 | 2008-02-26 | Corestreet, Ltd. | Efficient certificate revocation |
US7600129B2 (en) | 1995-10-02 | 2009-10-06 | Corestreet, Ltd. | Controlling access using additional data |
US7353396B2 (en) | 1995-10-02 | 2008-04-01 | Corestreet, Ltd. | Physical access control |
US5793868A (en) * | 1996-08-29 | 1998-08-11 | Micali; Silvio | Certificate revocation system |
US8732457B2 (en) * | 1995-10-02 | 2014-05-20 | Assa Abloy Ab | Scalable certificate validation and simplified PKI management |
US5604804A (en) * | 1996-04-23 | 1997-02-18 | Micali; Silvio | Method for certifying public keys in a digital signature scheme |
US8015597B2 (en) | 1995-10-02 | 2011-09-06 | Corestreet, Ltd. | Disseminating additional data used for controlling access |
US8261319B2 (en) | 1995-10-24 | 2012-09-04 | Corestreet, Ltd. | Logging access attempts to an area |
DE59607107D1 (de) * | 1995-11-02 | 2001-07-19 | Siemens Ag | Verfahren zur missbrauchserschwerung bei kommunikationsdiensten |
US6301659B1 (en) | 1995-11-02 | 2001-10-09 | Silvio Micali | Tree-based certificate revocation system |
US6026163A (en) * | 1995-12-13 | 2000-02-15 | Micali; Silvio | Distributed split-key cryptosystem and applications |
US5764772A (en) * | 1995-12-15 | 1998-06-09 | Lotus Development Coporation | Differential work factor cryptography method and system |
US6219423B1 (en) * | 1995-12-29 | 2001-04-17 | Intel Corporation | System and method for digitally signing a digital agreement between remotely located nodes |
GB9601924D0 (en) * | 1996-01-31 | 1996-04-03 | Certicom Corp | Transaction verification protocol for smart cards |
US5666414A (en) * | 1996-03-21 | 1997-09-09 | Micali; Silvio | Guaranteed partial key-escrow |
US5956409A (en) * | 1996-04-29 | 1999-09-21 | Quintet, Inc. | Secure application of seals |
US5610982A (en) * | 1996-05-15 | 1997-03-11 | Micali; Silvio | Compact certification with threshold signatures |
US5638447A (en) * | 1996-05-15 | 1997-06-10 | Micali; Silvio | Compact digital signatures |
WO1998040982A1 (en) | 1997-03-12 | 1998-09-17 | Visa International | Secure electronic commerce employing integrated circuit cards |
US6030288A (en) | 1997-09-02 | 2000-02-29 | Quixotic Solutions Inc. | Apparatus and process for verifying honest gaming transactions over a communications network |
US7225463B2 (en) | 1997-10-24 | 2007-05-29 | Dusenbury Jr Richard G | Secure network architecture method and apparatus |
US6189101B1 (en) | 1997-10-24 | 2001-02-13 | Richard G. Dusenbury, Jr. | Secure network architecture method and apparatus |
IL122106A (en) * | 1997-11-04 | 2010-11-30 | Enco Tone Ltd | Method and algorithms for identification and validation |
US7249110B1 (en) * | 1999-08-03 | 2007-07-24 | Matsushita Electric Industrial Co, Ltd. | Individual authentication method, individual authentication apparatus, accounting method, accounting apparatus |
US6564104B2 (en) | 1999-12-24 | 2003-05-13 | Medtronic, Inc. | Dynamic bandwidth monitor and adjuster for remote communications with a medical device |
US7499875B1 (en) | 2000-03-17 | 2009-03-03 | Ebay Inc. | Method and apparatus for facilitating online payment transactions in a network-based transaction facility using multiple payment instruments |
US8706618B2 (en) | 2005-09-29 | 2014-04-22 | Ebay Inc. | Release of funds based on criteria |
AU2001245754A1 (en) * | 2000-03-17 | 2001-10-03 | Ebay, Inc. | Method and apparatus for facilitating online payment transactions in a network-based transaction facility using multiple payment instruments |
AU7182701A (en) | 2000-07-06 | 2002-01-21 | David Paul Felsher | Information record infrastructure, system and method |
US20020066034A1 (en) * | 2000-10-24 | 2002-05-30 | Schlossberg Barry J. | Distributed network security deception system |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
JP2003069649A (ja) * | 2001-08-22 | 2003-03-07 | Murata Mach Ltd | ファクシミリサーバ |
US20030065792A1 (en) * | 2001-09-28 | 2003-04-03 | Clark Gregory Scott | Securing information in a design collaboration and trading partner environment |
US20040143733A1 (en) * | 2003-01-16 | 2004-07-22 | Cloverleaf Communication Co. | Secure network data storage mediator |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
EP1627488A4 (de) * | 2003-05-13 | 2008-06-04 | Corestreet Ltd | Effiziente und sichere datenaktualitätssysteme |
EP1636682A4 (de) * | 2003-06-24 | 2009-04-29 | Corestreet Ltd | Zugangskontrolle |
JP2007511983A (ja) * | 2003-11-19 | 2007-05-10 | コアストリート、 リミテッド | 分散委任されたパス発見及び検証 |
CA2872032A1 (en) * | 2004-01-09 | 2005-08-04 | Corestreet, Ltd. | Signature-efficient real time credentials for ocsp and distributed ocsp |
US20050231738A1 (en) * | 2004-03-10 | 2005-10-20 | Elynx, Ltd. | Electronic document management system |
US8572388B2 (en) * | 2004-03-10 | 2013-10-29 | Elynx, Ltd. | Electronic document management system |
US20060095759A1 (en) * | 2004-10-28 | 2006-05-04 | Brookner George M | Method and system for arranging communication between a data processing device and a remote data processing center |
US7205882B2 (en) * | 2004-11-10 | 2007-04-17 | Corestreet, Ltd. | Actuating a security system using a wireless device |
US8422667B2 (en) | 2005-01-27 | 2013-04-16 | The Chamberlain Group, Inc. | Method and apparatus to facilitate transmission of an encrypted rolling code |
US9148409B2 (en) | 2005-06-30 | 2015-09-29 | The Chamberlain Group, Inc. | Method and apparatus to facilitate message transmission and reception using different transmission characteristics |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US20080217400A1 (en) * | 2007-03-06 | 2008-09-11 | Portano Michael D | System for preventing fraudulent purchases and identity theft |
US10652743B2 (en) | 2017-12-21 | 2020-05-12 | The Chamberlain Group, Inc. | Security system for a moveable barrier operator |
US11074773B1 (en) | 2018-06-27 | 2021-07-27 | The Chamberlain Group, Inc. | Network-based control of movable barrier operators for autonomous vehicles |
US11423717B2 (en) | 2018-08-01 | 2022-08-23 | The Chamberlain Group Llc | Movable barrier operator and transmitter pairing over a network |
US10997810B2 (en) | 2019-05-16 | 2021-05-04 | The Chamberlain Group, Inc. | In-vehicle transmitter training |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2144439A5 (de) * | 1971-06-30 | 1973-02-09 | Ibm | |
EP0021401A1 (de) * | 1979-06-29 | 1981-01-07 | International Business Machines Corporation | Verfahren und Vorrichtung zur Transaktions- und Identitätsprüfung |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4223403A (en) * | 1978-06-30 | 1980-09-16 | International Business Machines Corporation | Cryptographic architecture for use with a high security personal identification system |
-
1980
- 1980-07-02 US US06/165,455 patent/US4326098A/en not_active Expired - Lifetime
-
1981
- 1981-06-16 DE DE8181104628T patent/DE3166298D1/de not_active Expired
- 1981-06-16 EP EP81104628A patent/EP0043027B1/de not_active Expired
- 1981-06-29 JP JP9981381A patent/JPS5745756A/ja active Granted
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2144439A5 (de) * | 1971-06-30 | 1973-02-09 | Ibm | |
EP0021401A1 (de) * | 1979-06-29 | 1981-01-07 | International Business Machines Corporation | Verfahren und Vorrichtung zur Transaktions- und Identitätsprüfung |
Non-Patent Citations (2)
Title |
---|
Afips Conference Proceedings of the 1979 National Computer Conference, 1979, Montvale, US KLINE et al. "Public Key VS. Conventional Key Encryption" pages 831-837 * page 836, left-hand column, line 24-38; right-hand column, lines 16-20 * * |
Seventeenth IEEE Computer Society International Conference: Proceedings Computer Communications Networks; September 5-8, 1978, New York, US SENDROW: "Key Management in EFT Networks", pages 351-354. * page 352, right-hand column, lines 26-45 * * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3229593A1 (de) * | 1982-08-09 | 1984-02-09 | Telefonbau Und Normalzeit Gmbh, 6000 Frankfurt | Verfahren und schaltungsanordnung zur autorisierten uebermittlung von nachrichten |
US4890323A (en) * | 1986-05-22 | 1989-12-26 | Racal-Guardata Limited | Data communication systems and methods |
EP0389895A1 (de) * | 1989-03-16 | 1990-10-03 | Yeda Research And Development Company Limited | Verfahren und Apparat für Benützeridentifikation, beruhend auf permutierten Kernen |
GB2260467A (en) * | 1991-09-12 | 1993-04-14 | Blick Communications Ltd | Repeater |
US6356941B1 (en) * | 1999-02-22 | 2002-03-12 | Cyber-Ark Software Ltd. | Network vaults |
Also Published As
Publication number | Publication date |
---|---|
US4326098A (en) | 1982-04-20 |
DE3166298D1 (en) | 1984-10-31 |
EP0043027B1 (de) | 1984-09-26 |
JPS5745756A (en) | 1982-03-15 |
JPS625544B2 (de) | 1987-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4326098A (en) | High security system for electronic signature verification | |
US4349695A (en) | Recipient and message authentication method and system | |
US5371796A (en) | Data communication system | |
JP2746352B2 (ja) | 遠隔位置に設置したコンピュータによる通信のための機密防護通信システム及び方法 | |
US3798605A (en) | Centralized verification system | |
EP0021401B1 (de) | Verfahren und Vorrichtung zur Transaktions- und Identitätsprüfung | |
US8559639B2 (en) | Method and apparatus for secure cryptographic key generation, certification and use | |
US6073237A (en) | Tamper resistant method and apparatus | |
US5491752A (en) | System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens | |
US5978475A (en) | Event auditing system | |
EP0539727B1 (de) | Sicherung/Rückgewinnung der Umgebung einer Geheimübertragungseinrichtung und Vervielfältigung in einem Kryptosystem mit öffentlichem Schlüssel | |
US4723284A (en) | Authentication system | |
EP0005179A2 (de) | Beglaubigung der Identität eines Benutzers eines Informationssystems | |
US20060195402A1 (en) | Secure data transmission using undiscoverable or black data | |
JPH0451864B2 (de) | ||
EP1129541A1 (de) | Verfahren und vorrichtung zur authentifizierung und nutzung von gesicherten mitteln in einem computersystem | |
FI86486C (fi) | Foerfarande foer att arrangera teleroestningen pao ett saekert saett. | |
WO2000049764A1 (en) | Data authentication system employing encrypted integrity blocks | |
JPH11282982A (ja) | 利用者カード、通信端末機、通信サーバ、通信システム、および、通信システムの利用者認証方法 | |
JPH06504626A (ja) | アクセスコントロールおよび/または識別方法および装置 | |
CN108667801A (zh) | 一种物联网接入身份安全认证方法及系统 | |
Simmons | A natural taxonomy for digital information authentication schemes | |
GB2267631A (en) | Data communication system | |
JPS59158639A (ja) | 自動照合の方法および装置 | |
GB2391669A (en) | Portable device for verifying a document's authenticity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Designated state(s): DE FR GB |
|
17P | Request for examination filed |
Effective date: 19820202 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Designated state(s): DE FR GB |
|
REF | Corresponds to: |
Ref document number: 3166298 Country of ref document: DE Date of ref document: 19841031 |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed | ||
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 19910528 Year of fee payment: 11 Ref country code: FR Payment date: 19910528 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 19910619 Year of fee payment: 11 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Effective date: 19920616 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 19920616 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Effective date: 19930226 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Effective date: 19930302 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST |